Skip to content

Commit

Permalink
User/lsh/security review (#486)
Browse files Browse the repository at this point in the history
* Update azure-pipelines-ci.yml for Azure Pipelines
  • Loading branch information
olivershen-wow authored May 30, 2023
1 parent 840d50f commit 37a1f69
Showing 1 changed file with 27 additions and 1 deletion.
28 changes: 27 additions & 1 deletion azure-pipelines-ci.yml
Original file line number Diff line number Diff line change
Expand Up @@ -15,6 +15,8 @@ variables:
value: 'windows-latest'
- name: fullBuild
value: $[ne(variables['Build.Reason'], 'PullRequest')]
- name: securityScan
value: $[or(eq(variables['Build.Reason'], 'Manual'), eq(variables['Build.Reason'], 'Schedule'))]

stages:
- stage: Build
Expand All @@ -37,6 +39,17 @@ stages:
command: 'custom'
workingDir: 'react'
customCommand: 'run pub'
- task: CodeInspector@2
displayName: "[Security Review] code inspector"
inputs:
ProductId: '606a5e0d-64b0-4237-9dca-eac200438452'
condition: eq(variables.securityScan, 'true')
- task: CodeQL3000Init@0
displayName: "[Security Review] CodeQL Init"
condition: eq(variables.securityScan, 'true')
- task: CredScan@3
displayName: "[Security Review] CredScan"
condition: eq(variables.securityScan, 'true')
- task: PowerShell@2
displayName: Generate Env File
inputs:
Expand Down Expand Up @@ -259,4 +272,17 @@ stages:
PathtoPublish: '$(Build.ArtifactStagingDirectory)'
ArtifactName: 'HydraLabRelease'
publishLocation: 'Container'
condition: eq(variables.fullBuild, 'true')
condition: eq(variables.fullBuild, 'true')
- task: CodeQL3000Finalize@0
displayName: "[Security Review] CodeQL Finalize"
condition: eq(variables.securityScan, 'true')
- task: securedevelopmentteam.vss-secure-development-tools.build-task-report.SdtReport@2
# https://strikecommunity.azurewebsites.net/articles/8216/how-to-enable-build-break-on-credscan-detections.html
displayName: "[Security Review] Create CredScan Security Analysis Report"
inputs:
GdnExportHtmlFile: true
GdnExportAllTools: false
GdnExportGdnToolBinSkim: true
GdnExportGdnToolCredScan: true
GdnExportGdnToolSemmle: true
condition: eq(variables.securityScan, 'true')

0 comments on commit 37a1f69

Please sign in to comment.